Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
aports
aports
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 652
    • Issues 652
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 196
    • Merge Requests 196
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Environments
  • Analytics
    • Analytics
    • CI / CD
    • Repository
    • Value Stream
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
  • alpine
  • aportsaports
  • Issues
  • #10366

Closed
Open
Opened Apr 29, 2019 by Alicha CH@alichaReporter
  • Report abuse
  • New issue
Report abuse New issue

bind: Multiple vulnerabilities (CVE-2018-5743, CVE-2019-6467)

CVE-2018-5743: Limiting simultaneous TCP clients is ineffective

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for
most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contains an error which can be exploited to grow the number of simultaneous connections beyond this limit.

Affected Versions:

BIND 9.9.0 ->9.10.8-P1, 9.11.0 ->9.11.6, 9.12.0 ->9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5.
Versions 9.13.0 ->9.13.7 of the 9.13 development branch are also affected.

Fixed In Version:

bind 9.11.6-P1, bind 9.12.4-P1, bind 9.14.1

References:

https://kb.isc.org/docs/cve-2018-5743
https://www.openwall.com/lists/oss-security/2019/04/25/3

CVE-2019-6467: flaw in nxredirect can cause assertion failure

A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if the alternate namespace used by nxdomain-redirect is a descendant of a zone that is served locally.
The most likely scenario where this might occur is if the server, in addition to performing NXDOMAIN redirection for recursive clients, is also serving a local copy of the root zone or using mirroring
to provide the root zone, although other configurations are also possible.

Affected Versions:

BIND 9.12.0->9.12.4, 9.14.0. Also affects all releases in the 9.13 development branch.

Fixed In Version:

bind 9.12.4-P1, bind 9.14.1

References:

https://kb.isc.org/docs/cve-2019-6467
https://www.openwall.com/lists/oss-security/2019/04/25/3

(from redmine: issue id 10366, created on 2019-04-29, closed on 2019-05-03)

  • Relations:
    • child #10367 (closed)
    • child #10368 (closed)
    • child #10369 (closed)
    • child #10370 (closed)
    • child #10371 (closed)
To upload designs, you'll need to enable LFS and have admin enable hashed storage. More information
Assignee
Assign to
None
Milestone
None
Assign milestone
Time tracking
None
Due date
None
3
Labels
Normal tag:security type:bug
Assign labels
  • View project labels
Reference: alpine/aports#10366